You are on page 1of 24

Routing Protocols To Mitigate Congestion In Wireless Sensor Networks

Click to edit Master subtitle style

Supritha.C, Usha.M.C,
4/24/12

Final Year BE, 8th SEM, Department of CSE, RYMEC,Bellary.

Contents
Introduction Differentiated service CAR MCAR SCAR Performance Evaluation Conclusion References

4/24/12 RYMEC,Bellary

Introduction
Wireless Sensor Networks Congestion Routing protocols Conzone

4/24/12 RYMEC,Bellary

Conzone

4/24/12 RYMEC,Bellary

Proposed Scheme
Existing schemes consider all data to be equally important. But not all data is equally important High priority data(HP) Low priority data(LP) Differentiated service Accommodate both, emphasize on HP LP over longer routes
4/24/12 RYMEC,Bellary

Contd..
Contributions of this paper Congestion Aware routing (CAR) MAC enhanced CAR (MCAR) Secure CAR (SCAR)

4/24/12 RYMEC,Bellary

Congestion Aware Routing (CAR)


CAR comprises three steps 1. Network formation 2. Conzone discovery 3. Differentiated routing

4/24/12 RYMEC,Bellary

1.Network Formation

This step divides the

nodes into On-conzone and Off-conzone nodes

It forms a HP network

(HiNet) to forward HP data

4/24/12 RYMEC,Bellary

HiNet formation Process


1. Sink broadcasts Build HiNet message 2. Nodes check whether they are joined 3. If not, message source is set as parent 4. Build HiNet is rebroadcasted again 5. Thus, all nodes become part of the graph 6. Periodic rebroadcast
4/24/12 RYMEC,Bellary

2.Conzone Discovery
A Conzone must be discovered for the delivery of HP data. Steps in conzone discovery algorithm 1. Critical area nodes broadcast To Sink messages. 2. When a node hears more than Alpha distinct To Sink messages, it marks itself as on conzone. 3. This message is overheard by neighbors in the neighborhood table. 4. Flood Destroy conzone message

4/24/12 RYMEC,Bellary

3.Differentiated Routing
Routing details HP data LP data generated within the conzone

A B C LP data generated outside the conzone


4/24/12 RYMEC,Bellary

MAC-Enhanced CAR(MCAR)
MCAR comprises three steps: 1. 2. 3. Network formation Setting modes Routing data.

4/24/12 RYMEC,Bellary

1.Network Formation
The nodes are expected to be mobile. Hence the HP paths are dynamically created.

4/24/12 RYMEC,Bellary

2.Setting Modes
LP Mode HP Mode Shadow Mode

4/24/12 RYMEC,Bellary

3.Routing
Route discovery is performed dynamically at the time of HP event detection. MCAR performs on-demand route discovery.

4/24/12 RYMEC,Bellary

Security Issues in WSN


Data Authentication Data secrecy Replay Protection Low energy consumption

4/24/12 RYMEC,Bellary

Secure CAR(SCAR)
SCAR comprises five steps: 1. Formation of HP Routing Network 2. Conzone Discovery 3. Encryption 4. Differentiated Routing
4/24/12 RYMEC,Bellary

5. Decryption

Encryption & Decryption


Encryption is the conversion of data into a form called Cipher text that cannot be easily understood by unauthorised users. Decryption is the process of converting encrypted data back to its original form which can be understood. In SCAR we use symmetric keys for this.
4/24/12 RYMEC,Bellary

Results - Performance Analysis

Average no of received packets for CAR

Average no of received packets for MCAR

4/24/12 RYMEC,Bellary

Conclusion
Data delivery issues, in the presence of congestion in wireless sensor networks are analyzed. CAR, suitable for networks with low mobility. MCAR, designed for networks with high mobility.
4/24/12 RYMEC,Bellary

Contd..
Both support effective HP data delivery in the

Contd.. presence of congestion.


previous approaches.

SCAR, offers a high level of security than the

4/24/12 RYMEC,Bellary

References
[1]K. Akkaya and M.F. Younis, An Energy-Aware QoS Routing Protocol for Wireless Sensor Networks, Proc. 23rd IEEE Int Conf. Distributed Computing Systems (ICDCS), pp. 710-715, 2003. [2] C. Lu, B. Blum, T. Abdelzaher, J. Stankovic, and T. He, RAP: A Real-Time Communication Architecture for Large-Scale Wireless Sensor Networks. Eighth IEEE Real-Time and Embedded Technology and Applications Symp. (RTAS), pp. 55-66, 2002. [3] H. Zhang, A. Arora, Y. Choi, and M. Gouda, Reliable Bursty Convergecast in Wireless Sensor Networks. ACM MobiHoc, 2005. [4] P. Rogaway, M. Bellare, and J. Black. OCB: A block-cipher mode of operation for efficient authenticated encryption. In ACM TISSEC, November 2001. [5] Kumar, R. Crepaldi, R. Rowaihy, H. Harris, A.F. Guohong Cao Zorzi, M. La Porta, T.F,"Mitigating Performance Degradation in Congested Sensor Networks",IEEE Transactions on Mobile Computing,2008. [6] C.-Y. Wan, S.B. Eisenman, and A.T. Campbell, CODA: Congestion Detection and Avoidance in Sensor Networks. First ACM Conf. Embedded Networked Sensor Systems (SenSys), pp. 266-279, 2003. [7] B. Hull, K. Jamieson, and H. Balakrishnan, Mitigating Congestion in Wireless Sensor Networks. Second ACM Conf. Embedded Networked Sensor Systems (SenSys), 2004. [8] Luk, M. Mezzour, G. Perrig, A. Gligor, V., 6th International Symposium on Information Processing in Sensor Networks, 2007. [9] KASTEN, O. Energy consumption. http://www.inf.ethz.ch/ kasten/ research/bathtub/energy consumption.html. [10] Draft Supplement to Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Enhancements for Quality of Service (QoS), IEEE 802.11e/ D4.0, Nov. 2002. [11] G.-S. Ahn, L.-H. Sun, A. Veres, and A.T. Campbell, Swan: Service Differentiation in Stateless Wireless Ad Hoc Networks, Proc. IEEE INFOCOM, 2002. [12] S.R. Das, C.E. Perkins, and E.M. Belding-Royer, Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks, Proc. IEEE INFOCOM 00, pp. 3-12, 2000. [13] C.T. Ee and R. Bajcsy, Congestion Control and Fairness for Many-to-One Routing in Sensor Networks, Proc. Second ACM Conf. Embedded Networked Sensor Systems (SenSys 04), pp. 148-161, 2004. [14] E. Felemban, C.-G. Lee, and E. Ekici, MMSPEED: Multipath Multi-SPEED Protocol for QoS Guarantee of Reliability and Timeliness in Wireless Sensor Networks, IEEE Trans. Mobile Computing, vol. 6, pp. 738-754, 2006.

[15] T. He, J.A. Stankovic, C. Lu, 4/24/12Distributed Computingand T. Abdelzaher, Speed: A Stateless Protocol for Real-Time Communication in Sensor Networks, Proc. 23rd IEEE Intl Conf. Systems (ICDCS), 2003. RYMEC,Bellary

Any Questions??

4/24/12 RYMEC,Bellary

4/24/12 RYMEC,Bellary

You might also like